MCollective 2.7.0 and 2.8.x before 2.8.9, as used in Puppet Enterprise, allows remote attackers to execute arbitrary code via vectors related to the mco ping command.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2016-2788 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects Red Hat Enterprise OpenShift 2. Red Hat Product Security has rated this issue as having Moderate security impact. A futur
e update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 4.9 |
---|---|
Base Metrics | AV:N/AC:M/Au:S/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 6.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N |
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | High |
User Interaction | None |
Scope | Changed |
Confidentiality | Low |
Integrity Impact | High |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat OpenShift Enterprise 2 | ruby193-mcollective | Will not fix |